暂无分享,去创建一个
Christos Faloutsos | V. S. Subrahmanian | Mohit Kumar | Bryan Hooi | Srijan Kumar | Disha Makhija | Srijan Kumar | C. Faloutsos | Bryan Hooi | Mohit Kumar | Disha Makhija
[1] Martin Ester,et al. Detecting Singleton Review Spammers Using Semantic Similarity , 2015, WWW.
[2] Srinivasan Venkatesh,et al. Battling the Internet water army: Detection of hidden paid posters , 2011, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[3] Philip S. Yu,et al. Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.
[4] References , 1971 .
[5] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[6] Michalis Faloutsos,et al. TrueView: Harnessing the Power of Multiple Review Sites , 2015, WWW.
[7] Arjun Mukherjee,et al. What Yelp Fake Review Filter Might Be Doing? , 2013, ICWSM.
[8] Krishna P. Gummadi,et al. Strength in Numbers: Robust Tamper Detection in Crowd Computations , 2015, COSN.
[9] Christos Faloutsos,et al. Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.
[10] Christos Faloutsos,et al. Edge Weight Prediction in Weighted Signed Networks , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[11] Xifeng Yan,et al. Synthetic review spamming and defense , 2013, WWW.
[12] Mohammad Ali Abbasi,et al. Trust-Aware Recommender Systems , 2014 .
[13] Christos Faloutsos,et al. Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.
[14] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[15] Hyun Ah Song,et al. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.
[16] Derek Greene,et al. Merging multiple criteria to identify suspicious reviews , 2010, RecSys '10.
[17] Philip S. Yu,et al. Review spam detection via temporal pattern discovery , 2012, KDD.
[18] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[19] Qiyi Tang,et al. Additional material , 2022, The Works of Graham Greene, Volume 3.
[20] Christos Faloutsos,et al. BIRDNEST: Bayesian Inference for Ratings-Fraud Detection , 2015, SDM.
[21] Charu C. Aggarwal,et al. The Troll-Trust Model for Ranking in Signed Networks , 2016, WSDM.
[22] Jure Leskovec,et al. Antisocial Behavior in Online Discussion Communities , 2015, ICWSM.
[23] Weixiang Shao,et al. Bimodal Distribution and Co-Bursting in Review Spam Detection , 2017, WWW.
[24] Jure Leskovec,et al. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews , 2013, WWW.
[25] Arnab Bhattacharya,et al. Finding the bias and prestige of nodes in networks based on trust scores , 2011, WWW.
[26] Anna Cinzia Squicciarini,et al. Uncovering Crowdsourced Manipulation of Online Reviews , 2015, SIGIR.
[27] Abhinav Kumar,et al. Spotting opinion spammers using behavioral footprints , 2013, KDD.
[28] George Valkanas,et al. The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry , 2016, Inf. Syst. Res..
[29] Jing Wang,et al. Bonus, Disclosure, and Choice: What Motivates the Creation of High-Quality Paid Reviews? , 2012, ICIS.
[30] Leman Akoglu,et al. Collective Opinion Spam Detection: Bridging Review Networks and Metadata , 2015, KDD.
[31] Hong Cheng,et al. Robust Reputation-Based Ranking on Bipartite Rating Networks , 2012, SDM.
[32] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[33] Leman Akoglu,et al. Discovering Opinion Spammer Groups by Network Footprints , 2015, ECML/PKDD.
[34] Christos Faloutsos,et al. CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.
[35] Bing Liu,et al. Opinion spam and analysis , 2008, WSDM '08.